Tommaso Frassetto

According to our database1, Tommaso Frassetto authored at least 21 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
POSE: Practical Off-chain Smart Contract Execution.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Raising The Bar: Advancing Mitigations Against Memory-Corruption and Side-Channel Attacks.
PhD thesis, 2022

CFInsight: A Comprehensive Metric for CFI Policies.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Trusted Configuration in Cloud FPGAs.
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021

2020
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.
IEEE Secur. Priv., 2020

SAFE: A Secure and Efficient Long-Term Distributed Storage System.
IACR Cryptol. ePrint Arch., 2020

V0LTpwn: Attacking x86 Processor Integrity from Software.
Proceedings of the 29th USENIX Security Symposium, 2020

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
Proceedings of the 29th USENIX Security Symposium, 2020

Offline Model Guard: Secure and Private ML on Mobile Devices.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
FastKitten: Practical Smart Contracts on Bitcoin.
IACR Cryptol. ePrint Arch., 2019

NAUTILUS: Fishing for Deep Bugs with Grammars.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
IMIX: In-Process Memory Isolation EXtension.
Proceedings of the 27th USENIX Security Symposium, 2018

The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Proceedings of the 27th USENIX Security Symposium, 2018

VoiceGuard: Secure and Private Speech Processing.
Proceedings of the 19th Annual Conference of the International Speech Communication Association, 2018

Advances and throwbacks in hardware-assisted security: special session.
Proceedings of the International Conference on Compilers, 2018

2017
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

JITGuard: Hardening Just-in-time Compilers with SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Proc. Priv. Enhancing Technol., 2016


  Loading...